Re: [mailop] [EXTERNAL] Re: Success MiTM attack

2023-10-22 Thread Brotman, Alex via mailop
I'm not aware of any MUA that supports DANE. I'm also not sure there exists an RFC that notes how an MUA should use DANE for submitting messages. I suppose that doesn't preclude one from using DNSSEC to ensure the records are signed, but am not aware of a document that creates something like a

Re: [mailop] Success MiTM attack

2023-10-22 Thread Matt Palmer via mailop
On Sun, Oct 22, 2023 at 12:48:26PM +0300, Mary via mailop wrote: > from what I understand, this is a government issued wiretapping against > that specific services/servers (hosted by Hetzner and Linode in Germany?) > and not a general TLS exploit. On what evidence do you base that understanding?

Re: [mailop] Success MiTM attack

2023-10-22 Thread Matt Palmer via mailop
On Sun, Oct 22, 2023 at 08:56:26PM +, Gellner, Oliver via mailop wrote: > > On 22.10.2023 at 15:06 Philip Paeps via mailop wrote: > > On 2023-10-22 14:34:39 (+0530), Slavko via mailop wrote: > >> while not directly about email, recently was published details > >> about success MiTM attack agai

Re: [mailop] Success MiTM attack

2023-10-22 Thread Taavi Eomäe via mailop
On 22/10/2023 16:08, Slavko via mailop wrote: Hmm, and what about MUAs? Without MUA-STS, it's up to the MUAs and only MUAs to enforce connection security. The next step after that would be some kind of pinning. Some have suggested DANE+DNSSEC, but DNSSEC operators can be coerced just as muc

Re: [mailop] Success MiTM attack

2023-10-22 Thread Gellner, Oliver via mailop
> On 22.10.2023 at 15:06 Philip Paeps via mailop wrote: > > On 2023-10-22 14:34:39 (+0530), Slavko via mailop wrote: >> while not directly about email, recently was published details >> about success MiTM attack against XMPP server, the attacker >> was able to decrypt TLS communication without no

Re: [mailop] Success MiTM attack

2023-10-22 Thread Slavko via mailop
Dňa 22. októbra 2023 19:18:33 UTC používateľ Jeroen via mailop napísal: >...most MTAs and MUAs support it out of the box. Is list of these availeble somewhere? regards -- Slavko https://www.slavino.sk/ ___ mailop mailing list mailop@mailop.org htt

Re: [mailop] Success MiTM attack

2023-10-22 Thread Jeroen via mailop
I read that they were able to redirect the traffic to their own machine, and therefore perform an http-01 challenge like anyone else. Which can effectively be mitigated by using DNSSEC, DANE and CAA. Browser support for DANE is currently rather poor, but most MTAs and MUAs support it out of th

Re: [mailop] Success MiTM attack

2023-10-22 Thread Matt Corallo via mailop
On 10/22/23 9:08 AM, Slavko via mailop wrote: Dňa 22. októbra 2023 12:50:52 UTC používateľ Philip Paeps napísal: Note that, as far as email is concerned, plaintext downgrade attacks are much more likely than fraudulent certificates. Hmm, and what about MUAs? As Philip pointed out, DNS

Re: [mailop] Success MiTM attack

2023-10-22 Thread Matt Corallo via mailop
SSL certificates do not, and have never, "protected against MiTM". The certificate authority trust model can best be summarized as "someone else's DNS resolver and connection", it is not a statement of who actually owns the domain or what server is actually supposed to be on the other end. If y

Re: [mailop] Success MiTM attack

2023-10-22 Thread Romain via mailop
I read that they were able to redirect the traffic to their own machine, and therefore perform an http-01 challenge like anyone else. Le dim. 22 oct. 2023 à 18:55, Alessandro Vesely via mailop < mailop@mailop.org> a écrit : > On Sun 22/Oct/2023 13:18:53 +0200 Hans-Martin Mosner via mailop wrote:

Re: [mailop] Success MiTM attack

2023-10-22 Thread Alessandro Vesely via mailop
On Sun 22/Oct/2023 13:18:53 +0200 Hans-Martin Mosner via mailop wrote: Am 22.10.23 um 12:23 schrieb Paul Menzel via mailop: It was interesting and surprising to me, as the common perception is, that SSL certificates protect against MiTM attacks as it should provide authenticity. The weak poin

Re: [mailop] Success MiTM attack

2023-10-22 Thread Slavko via mailop
Dňa 22. októbra 2023 12:50:52 UTC používateľ Philip Paeps napísal: >Note that, as far as email is concerned, plaintext downgrade attacks are much >more likely than fraudulent certificates. Hmm, and what about MUAs? regards -- Slavko https://www.slavino.sk/ _

Re: [mailop] Success MiTM attack

2023-10-22 Thread Philip Paeps via mailop
On 2023-10-22 14:34:39 (+0530), Slavko via mailop wrote: while not directly about email, recently was published details about success MiTM attack against XMPP server, the attacker was able to decrypt TLS communication without notice (from both sides, the server and client) and was success for at

Re: [mailop] Success MiTM attack

2023-10-22 Thread Romain via mailop
Use DANE, MTA-STS, TLSA, CCA (to restrict how certs can be issued to your domain, restrict the LetsEncrypt account, method, etc), host your own DNS and manage DNSSEC yourself. Le dim. 22 oct. 2023 à 11:20, Slavko via mailop a écrit : > Hi all, > > while not directly about email, recently was pub

Re: [mailop] Success MiTM attack

2023-10-22 Thread Hans-Martin Mosner via mailop
Am 22.10.23 um 12:23 schrieb Paul Menzel via mailop: It was interesting and surprising to me, as the common perception is, that SSL certificates protect against MiTM attacks as it should provide authenticity. The weak point of SSL certificates is that clients are willing to accept new certs fo

Re: [mailop] Success MiTM attack

2023-10-22 Thread Paul Menzel via mailop
Dear Mary, Am 22.10.23 um 11:48 schrieb Mary via mailop: from what I understand, this is a government issued wiretapping against that specific services/servers (hosted by Hetzner and Linode in Germany?) and not a general TLS exploit. so nothing interesting or unique. It was interesting and su

Re: [mailop] Success MiTM attack

2023-10-22 Thread Mary via mailop
from what I understand, this is a government issued wiretapping against that specific services/servers (hosted by Hetzner and Linode in Germany?) and not a general TLS exploit. so nothing interesting or unique. On Sun, 22 Oct 2023 09:04:39 + Slavko via mailop wrote: > Hi all, > > while

[mailop] Success MiTM attack

2023-10-22 Thread Slavko via mailop
Hi all, while not directly about email, recently was published details about success MiTM attack against XMPP server, the attacker was able to decrypt TLS communication without notice (from both sides, the server and client) and was success for at least three months, see https://notes.valdiks